DOD’s IT strategy implementation critical to tactical operations

It’s been seven months since the Defense Department released its IT enterprise strategy and roadmap, and now the department is working on implementing the priorities the plan outlined, including identity access management and keeping deployed troops linked to the network regardless of location.

At the FOSE conference in Washington April 4, deputy DOD CIO Rob Carey offered an update on the strategy’s execution, including the plan’s impact on service members serving abroad, and stressed its importance in both cyber and physical combat.

“There’s a team right now working on the schedule, the costs and the actual [plans] of what’s happening when, which will be presented to DOD leadership in the coming months,” Carey said. “This is a real thing; it’s actually happening now. As you can imagine, it’s taken awhile to get to this part, but we’re turning the corner.”

Many of the roadmap’s provisions are designed to bolster DOD’s networks in cyberspace, and those efforts are already under way in the form of infrastructure consolidation and the institution of a joint information environment.

Those provisions are both stand-alone measures – data center consolidation, a joint environment that connects troops scattered across the globe, and improved security controls that closely monitor and define network access – as well as pillars that depend on each other in supporting a shared way ahead for defense IT.

To achieve the joint environment, DOD is currently working to define the connections between deployed troops and the network.

“What’s the communications path from the soldier to the internet and back, or the sailor, or the airman or Marine? It’s amazing work to have that done, because you can see what systems are riding on that transport path and what missions are they accomplishing,” Carey said.

Identity management is the next big step in DOD enterprise IT, Carey stressed, echoing scores of DOD leaders who in recent months have been calling for tighter control and monitoring of who accesses what information, where on the network, and when.

“We’ve had common access cards for 12 years. We do cryptographic log-on to the network and then allow ourselves to access a lot of websites cryptographically. The next step is applications and data, and linking my attributes into certain things that I’m allowed to see, and stopping me from seeing things I’m not allowed to see if I try to go there,” Carey said.

He added that public key infrastructure is currently being rolled out on the classified SIPRNet.

“That helps us reduce anonymity on the network,” he said.

Overall, a prime driver behind the efforts is a focus on deployed troops’ ability to access critical information anytime, anywhere.

“Affording this secure access to the warfighter is really important to us,” Carey said. “The warfighter’s got to trust what shows up on the screen in front of him, because if we count on doing an operational maneuver with troops in harm’s way, we have to be able to trust that information is correct. This is a force multiplier for us.”

About the Author

Amber Corrin is a former staff writer for FCW and Defense Systems.

FCW in Print

In the latest issue: Looking back on three decades of big stories in federal IT.

Featured

  • FCW @ 30 GPS

    FCW @ 30

    Since 1986, FCW has covered it all -- the major contracts, the disruptive technologies, the picayune scandals and the many, many people who make federal IT function. Here's a look back at six of the most significant stories.

  • Shutterstock image.

    A 'minibus' appropriations package could be in the cards

    A short-term funding bill is expected by Sept. 30 to keep the federal government operating through early December, but after that the options get more complicated.

  • Defense Secretary Ash Carter speaks at the TechCrunch Disrupt conference in San Francisco

    DOD launches new tech hub in Austin

    The DOD is opening a new Defense Innovation Unit Experimental office in Austin, Texas, while Congress debates legislation that could defund DIUx.

  • Shutterstock image.

    Merged IT modernization bill punts on funding

    A House panel approved a new IT modernization bill that appears poised to pass, but key funding questions are left for appropriators.

  • General Frost

    Army wants cyber capability everywhere

    The Army's cyber director said cyber, electronic warfare and information operations must be integrated into warfighters' doctrine and training.

  • Rising Star 2013

    Meet the 2016 Rising Stars

    FCW honors 30 early-career leaders in federal IT.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group